Threats are silent and highly targeted to exploit target or steal data.
Fame Fortune People, Identities, & Information Computers & Networks
Attackers are increasingly developing highly sophisticated methods with the goal to penetrate rather than destruct.
We (Symantec) have seen sources of data change and plenty of evidence of “collateral damage”.
Data Breaches by Sector – Healthcare is #2 Good news: Bad news: Symantec Corp. Global XV Internet Security Threat Report Few exposed identities The number of breaches is high (reporting mandates is part contributor)
The ability to pull together multiple pieces of identity based information from multiple sources, and then automatically normalize and make sense of that information, is what is needed to accurately identify who did what and when.
Agenda Why traditional approaches don’t work 1 Dealing with the complexity in Healthcare 2 Adding Privacy to the Matrix 3 HITECH 4 Questions & Answers 5